web analytics

Which two features can be used to extend VRFs across a campus?

Which two features can be used to extend VRFs across a campus? (Choose two.) A. 802.1q trunks B. LDP C. MPLS TE D. GRE E. port channels Correct Answer: AD

You are asked to design a large campus network that will be using multicast for data transport. Which feature should be enabled at the Layer 2 access edge for host-only ports?

You are asked to design a large campus network that will be using multicast for data transport. Which feature should be enabled at the Layer 2 access edge for host-only

From a design perspective, what was not taken into account prior to implementing the solution?

After the recent implementation of a new design that incorporated GRE tunnels into the network, the network operations staff is seeing the following syslog message in multiple routers on the

A company plans to establish a new network using Cisco Catalyst switches for its multicast applications. What is the disadvantage when two multicast applications are using the multicast IP addresses 234.17.4.5 and 234.145.4.5 inside the same network?

A company plans to establish a new network using Cisco Catalyst switches for its multicast applications. What is the disadvantage when two multicast applications are using the multicast IP addresses

Which design concern should be accounted for in all Layer 3 virtualization technologies?

Which design concern should be accounted for in all Layer 3 virtualization technologies? A. Layer 3 redundancy B. packet sizing C. application usage D. Layer 3 stability Correct Answer: B

A many-to-many enterprise messaging application is using multicast as a transport mechanism. As part of the network design for this application, which multicast address should be used, according to best practices outlined in RFC 2365?

A many-to-many enterprise messaging application is using multicast as a transport mechanism. As part of the network design for this application, which multicast address should be used, according to best

When a design calls for spanning VLANs across a campus network, what are two issues that need to be addressed in the design? (Choose two.)

When a design calls for spanning VLANs across a campus network, what are two issues that need to be addressed in the design? (Choose two.) A. network convergence B. network

Which two aspects are considered when designing a dual hub, dual DMVPN cloud topology? (Choose two.)

Which two aspects are considered when designing a dual hub, dual DMVPN cloud topology? (Choose two.) A. recommended for high availability B. requires all sites to have dual Internet connections

When creating a network design, which one of these options provides for basic Layer 2 client isolation to prevent broadcast traffic exposure?

When creating a network design, which one of these options provides for basic Layer 2 client isolation to prevent broadcast traffic exposure? A. SVI B. VLAN C. routed port D.

When adding an IPSec headend termination device to your network design, which two performance indicators are the most accurate to determine device scalability? (Choose two.)

When adding an IPSec headend termination device to your network design, which two performance indicators are the most accurate to determine device scalability? (Choose two.) A. CPU capabilities B. bandwidth

While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during TCN in a Layer 2 switched network with many VLANs?

While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during TCN in a Layer 2 switched network with many

As a service provider you must support a Layer 2 virtualization protocol that does not include the use of label switching. Which option can meet this design requirement?

As a service provider you must support a Layer 2 virtualization protocol that does not include the use of label switching. Which option can meet this design requirement? A. VPLS

Which two techniques are used in a network design to slow down the distribution of topology information caused by a rapidly flapping link? (Choose two.)

Which two techniques are used in a network design to slow down the distribution of topology information caused by a rapidly flapping link? (Choose two.) A. Bidirectional Forwarding Detection B.

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two.)

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two.) A. Serialization delays are variable because they depend on

What is a key design aspect to be considered when designing an IP network that will be carrying real-time VoIP traffic?

What is a key design aspect to be considered when designing an IP network that will be carrying real-time VoIP traffic? A. Minimizing total bidirectional end-to-end delay to 0-150 ms

What is a key role for the access layer in a hierarchical network design?

What is a key role for the access layer in a hierarchical network design? A. The access layer provides a security, QoS, and policy trust boundary. B. The access layer

Which technique would you advise them to implement?

Your customer asks you to assist with their traffic policy design. They want to guarantee a minimum amount of bandwidth to certain traffic classes. Which technique would you advise them

You are designing a network that includes IP QoS. Which two architectures could be used to ensure that IP QoS is implemented properly? (Choose two.)

You are designing a network that includes IP QoS. Which two architectures could be used to ensure that IP QoS is implemented properly? (Choose two.) A. Differentiated Services, where the

How should multiple OSPF areas be designed when deployed on a classic three-layer (core/distribution/access) network hierarchy?

How should multiple OSPF areas be designed when deployed on a classic three-layer (core/distribution/access) network hierarchy? A. The OSPF flooding domain boundary should be at the edge of the core

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network. If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network. If the design must support

When network summaries are created for access networks in a network design, how does it change the behavior of the Shortest Path First (SPF) running in a backbone area?

When network summaries are created for access networks in a network design, how does it change the behavior of the Shortest Path First (SPF) running in a backbone area? A.

Where 0 is the default queue.

You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to

As part of the network design, ACME Corporation requires the ability to export IPv6 information to better manage its network. Which version of NetFlow records is required to export this information?

As part of the network design, ACME Corporation requires the ability to export IPv6 information to better manage its network. Which version of NetFlow records is required to export this

Which two OSPF design considerations should you implement to support the eventual growth of a network, so that CPU and memory are unaffected by the size and complexity of the link-state database in a large service provider network?

Which two OSPF design considerations should you implement to support the eventual growth of a network, so that CPU and memory are unaffected by the size and complexity of the

Which feature should be used to meet this design requirement?

ACME Corporation is deploying a new HR application that requires the network infrastructure to monitor and react to certain conditions in the network. Which feature should be used to meet

Your company is designing a service provider network management solution in which customers are billed for 95th percentile network utilization. The service provider requires that an IETF standard be utilized to collect the data. Which method should be used to collect the data?

Your company is designing a service provider network management solution in which customers are billed for 95th percentile network utilization. The service provider requires that an IETF standard be utilized

You are creating a network design that will influence the traffic path across the MPLS core on a virtual private LAN. Which parameter is included in your design to manage the traffic?

You are creating a network design that will influence the traffic path across the MPLS core on a virtual private LAN. Which parameter is included in your design to manage

Your company needs to baseline web traffic on a per-session basis for network application reporting. Which two mechanisms, when combined, fulfill the requirement? (Choose two.)

Your company needs to baseline web traffic on a per-session basis for network application reporting. Which two mechanisms, when combined, fulfill the requirement? (Choose two.) A. Flexible Netflow B. Remote

AS100 and AS200 each have two peering points in different parts of their network. AS100 would like to use one of the links and keep the other link as backup. What should be changed for the design inside AS100 for prefixes received from AS200?

AS100 and AS200 each have two peering points in different parts of their network. AS100 would like to use one of the links and keep the other link as backup.

You are designing a traffic monitoring and analysis system for a customer. Which traffic monitoring technique would you recommend to place the least amount of burden on the network infrastructure?

You are designing a traffic monitoring and analysis system for a customer. Which traffic monitoring technique would you recommend to place the least amount of burden on the network infrastructure?

Your company requires two diverse multihop External Border Gateway Protocol peerings to a partner network. Which two methods would you use to improve lost peer detection? (Choose two.)

Your company requires two diverse multihop External Border Gateway Protocol peerings to a partner network. Which two methods would you use to improve lost peer detection? (Choose two.) A. Use

Which tool should the designer recommend to validate quality of service mappings and use?

A designer is working with a large bank to redesign their network. The designer wants to minimize complaints regarding slow application response times across the WAN. It is suspected that

A network design includes a long signaling delay in notifying the Layer 3 control plane that an interface has failed. Which two of these actions would reduce that delay? (Choose two.)

A network design includes a long signaling delay in notifying the Layer 3 control plane that an interface has failed. Which two of these actions would reduce that delay? (Choose

Your company experienced a number of network incidents that had a significant impact on business operations. Because a root cause cannot be identified, your CTO asks you to help the network management team implement the FCAPS framework. On which two areas would you provide guidance to the network management team? (Choose two.)

Your company experienced a number of network incidents that had a significant impact on business operations. Because a root cause cannot be identified, your CTO asks you to help the

What are two benefits of using BFD for failure detection in the design of a network? (Choose two.)

What are two benefits of using BFD for failure detection in the design of a network? (Choose two.) A. BFD can provide failure detection in less than one second. B.

You are designing a solution to eliminate the risk of high CPU utilization on a core network composed of CRS-1 devices. Which option would eliminate the risk of high CPU utilization across the network?

You are designing a solution to eliminate the risk of high CPU utilization on a core network composed of CRS-1 devices. Which option would eliminate the risk of high CPU

In a network design using carrier Ethernet, which three mechanisms can be used to improve Layer 2 down detection and thereby reduce routing convergence time? (Choose three.)

In a network design using carrier Ethernet, which three mechanisms can be used to improve Layer 2 down detection and thereby reduce routing convergence time? (Choose three.) A. BFD B.

Which mode of Unicast RPF would you recommend as the lead network designer?

The network administrator of a branch office network has decided to deploy Unicast RPF at the access layer. He insists that the design must guarantee that all the packets arriving

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which three factors should you to consider when you adjust the timer values? (Choose three.)

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which three

When finalizing the network design, which security option must be configured on the switches?

Your design client has requested that you ensure that the client devices are not dynamically configured with incorrect DNS information. When finalizing the network design, which security option must be

What are two functions of an NSSA in an OSPF network design? (Choose two.)

What are two functions of an NSSA in an OSPF network design? (Choose two.) A. It overcomes issues with suboptimal routing when there are multiple exit points from the area.

As part of the security protocol for your network design, you have designated that option 82 is enabled for DHCP snooping. When option 82 is enabled, which information will be added to the DHCP request?

As part of the security protocol for your network design, you have designated that option 82 is enabled for DHCP snooping. When option 82 is enabled, which information will be

An IBGP mesh design is being scoped, and in the discussions, one of the design engineers proposes the use of route reflectors. Which limitation is valid when using route reflectors in this design?

An IBGP mesh design is being scoped, and in the discussions, one of the design engineers proposes the use of route reflectors. Which limitation is valid when using route reflectors

Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose two.)

Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose two.) A.

What will happen to your EIGRP neighbors if there is an LCP failure once your network is implemented?

You have designed a network to support two offices connected by a T1. Your router serial interfaces will be configured with encapsulation PPP. What will happen to your EIGRP neighbors

Which VLAN must be trunked back to the Clean Access Server from the access switch?

You are designing a NAC OOB Layer 3 Real-IP Gateway deployment for a customer. Which VLAN must be trunked back to the Clean Access Server from the access switch? A.

When a multiprotocol environment is designed to have several routers redistribute among the routing domains, how can routing loops be avoided?

When a multiprotocol environment is designed to have several routers redistribute among the routing domains, how can routing loops be avoided? A. by using the AS-PATH attribute B. by using

You are designing an 802.11 wireless network to include a controller as a central configuration point and access points across several remote sites. Which two aspects will manage the flow of the traffic to meet these design considerations? (Choose two.)

You are designing an 802.11 wireless network to include a controller as a central configuration point and access points across several remote sites. Which two aspects will manage the flow

How will you prevent transit traffic over the backup links?

You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your design, you are

You have been asked to design a wireless network solution that will implement context-aware services on an existing network that was initially deployed for data traffic only. Which two design principles would you follow to increase the location accuracy with the least possible impact on the current setup? (Choose two.)

You have been asked to design a wireless network solution that will implement context-aware services on an existing network that was initially deployed for data traffic only. Which two design